Tải bản đầy đủ (.pdf) (38 trang)

20410D 03

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (677.21 KB, 38 trang )

Microsoft Official Course
®

Module 3

Managing Active Directory Domain
Services Objects


Module Overview
• Managing User Accounts
• Managing Groups
• Managing Computer Accounts
• Delegating Administration


Lesson 1: Managing User Accounts
• AD DS Administration Tools
• Creating User Accounts
• Configuring User Account Attributes
• Creating User Profiles
• Demonstration: Managing User Accounts
• Demonstration: Using Templates to Manage User

Accounts


AD DS Administration Tools
To manage AD DS objects, you can use the
following graphical tools:
• Active Directory Administration snap-ins


• Active Directory Administrative Center
You can also use the following commandline tools:
• Active Directory module in Windows
PowerShell
• Directory Service commands

C:/


Creating User Accounts
The Account section of the Active Directory
Administrative Center Create User window


Configuring User Account Attributes
The Log on hours dialog box


Creating User Profiles

The Profile section of the User Properties
window


Demonstration: Managing User Accounts
In this demonstration, you will see how to:
• Use the Active Directory Administrative Center to

manage user accounts
• Delete a user account

• Create a new user account
• Move the user account
• View the WINDOWS POWERSHELL HISTORY
• Use Windows PowerShell to manage user accounts
• Find inactive user accounts
• Find disabled user accounts
• Delete disabled user accounts


Demonstration: Using Templates to Manage
User Accounts
In this demonstration, you will see how to:
• Create a user template account
• Use Windows PowerShell to create a user from the

user template
• Verify the properties of the new user account


Lesson 2: Managing Groups
• Group Types
• Group Scopes
• Implementing Group Management
• Default Groups
• Special Identities
• Demonstration: Managing Groups


Group Types
• Distribution groups

• Used only with email applications
• Not security-enabled (no SID);
cannot be given permissions
• Security groups
• Security principal with a SID;
can be given permissions
• Can also be email-enabled
Both security groups and distribution
groups can be converted to the other
type of group


Group Scopes
Members
Members from from domain
same domain
in same
forest

Members from
trusted
external
domain

Local

U, C,
GG, DLG, UG
and local users


U, C,
GG, UG

U, C,
GG

On the local
computer only

Domainlocal

U, C,
GG, DLG, UG

U, C,
GG, UG

U, C,
GG

Anywhere in the
domain

Universal

U, C,
GG, UG

U, C,
GG, UG


N/A

Anywhere in the
forest

Global

U, C,
GG

N/A

Anywhere in the
domain or a
trusted domain

Group
scope

U
C
GG

User
Computer
Global group

N/A


DLG
UG

Can be
assigned
permissions to
resources

Domain-local group
Universal group


Implementing Group Management
I Identities
Users or computers,
which are members of
G Global groups
Which collect members
based on members’ roles,
which are members of

Sales
(Global group)

DL Domain-local groups
Which provide management
such as resource access,
which are
A Assigned access to a resource


This best practice for nesting
groups is known as IGDLA.

Auditors
(Global group)

ACL_Sales_Read
(Domain-local group)


Implementing Group Management
I Identities
Users or computers,
which are members of


Implementing Group Management
I Identities
Users or computers,
which are members of
G Global groups
Which collect members
based on members’ roles,
which are members of

Sales
(Global group)

Auditors
(Global group)



Implementing Group Management
I Identities
Users or computers,
which are members of
G Global groups
Which collect members
based on members’ roles,
which are members of
DL Domain-local groups
Which provide management
such as resource access,
which are

Sales
(Global group)

Auditors
(Global group)

ACL_Sales_Read
(Domain-local group)


Implementing Group Management
I Identities
Users or computers,
which are members of
G Global groups

Which collect members
based on members’ roles,
which are members of
DL Domain-local groups
Which provide management
such as resource access,
which are
A Assigned access to a resource

Sales
(Global group)

Auditors
(Global group)

ACL_Sales_Read
(Domain-local group)


Implementing Group Management
I Identities
Users or computers,
which are members of
G Global groups
Which collect members
based on members’ roles,
which are members of
DL Domain-local groups
Which provide management
such as resource access,

which are
A Assigned access to a resource
This best practice for nesting
groups is known as IGDLA

Sales
(Global group)

Auditors
(Global group)

ACL_Sales_Read
(Domain-local group)


Default Groups
• Carefully manage the default groups that provide administrative

privileges, because these groups:
• Typically have broader privileges than are necessary for most
delegated environments
• Often apply protection to their members
Group

Location

Enterprise Admins

Users container of the forest root domain


Schema Admins

Users container of the forest root domain

Administrators

Built-in container of each domain

Domain Admins

Users container of each domain

Server Operators

Built-in container of each domain

Account Operators

Built-in container of each domain

Backup Operators

Built-in container of each domain

Print Operators

Built-in container of each domain

Cert Publishers


Users container of each domain


Special Identities
• Special identities:

Are groups for which membership is controlled by the
operating system
• Can be used by the Windows Server operating system to
provide access to resources:





Based on the type of authentication or connection
Not based on the user account

• Important special identities include:
• Anonymous Logon
• Interactive
• Authenticated Users
• Network
• Everyone
• Creator Owner


Demonstration: Managing Groups
In this demonstration, you will see how to:
• Create a new group

• Add members to the group
• Add a user to the group
• Change the group type and scope
• Modifying the group’s Managed By property


Lesson 3: Managing Computer Accounts
• What Is the Computers Container?
• Specifying the Location of Computer Accounts
• Controlling Permissions to Create Computer

Accounts
• Performing an Offline Domain Join
• Computer Accounts and Secure Channels
• Resetting the Secure Channel
• Bring Your Own Device


What Is the Computers Container?
Active Directory Administrative Center, opened to the
Adatum (local)\Computers container
Distinguished Name is cn=Computers,DC=Adatum,DC=com


Specifying the Location of Computer Accounts
• Best practice is to create OUs for

computer objects
Servers
• Typically subdivided by server role

• Client computers
• Typically subdivided by region


• Divide OUs:

By administration
• To facilitate configuration with Group
Policy



Controlling Permissions to Create Computer
Accounts
The Delegation of Control Wizard window
The administrator is creating a custom
delegation for computer objects


Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×